Am 30.11.20 um 20:01 schrieb Marc Roos
You assume incorrectly that every such log entry is from spoofed
traffic.
every relevant one, yes
This is about correct logging. Even if it is spoofed, logging the
correct spoofed address is better than logging a range (that include
ip's that are mayb
Am 01.12.20 um 17:15 schrieb Karl Pielorz:
--On 1 December 2020 at 08:24:50 -0600 Lyle Giese
wrote:
You need to look at the reply named sends when it trips and starts
limiting UDP traffic source from a given IP address. It tells the
requestor to try again using TCP instead of UDP.
So if t
2 matches
Mail list logo